城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.140.242 | attack | 2020-06-17T00:03:36.067695mail.standpoint.com.ua sshd[31174]: Invalid user silvio from 142.93.140.242 port 43750 2020-06-17T00:03:36.070299mail.standpoint.com.ua sshd[31174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 2020-06-17T00:03:36.067695mail.standpoint.com.ua sshd[31174]: Invalid user silvio from 142.93.140.242 port 43750 2020-06-17T00:03:37.535152mail.standpoint.com.ua sshd[31174]: Failed password for invalid user silvio from 142.93.140.242 port 43750 ssh2 2020-06-17T00:06:56.112872mail.standpoint.com.ua sshd[31629]: Invalid user teamspeak3 from 142.93.140.242 port 45070 ... |
2020-06-17 05:46:46 |
| 142.93.140.214 | attackspambots | Jun 15 18:54:18 php1 sshd\[21780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.214 user=root Jun 15 18:54:20 php1 sshd\[21780\]: Failed password for root from 142.93.140.214 port 35010 ssh2 Jun 15 18:57:30 php1 sshd\[21985\]: Invalid user lia from 142.93.140.214 Jun 15 18:57:30 php1 sshd\[21985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.214 Jun 15 18:57:32 php1 sshd\[21985\]: Failed password for invalid user lia from 142.93.140.214 port 36260 ssh2 |
2020-06-16 13:11:36 |
| 142.93.140.240 | attack | 142.93.140.240 - - [14/Jun/2020:14:48:50 +0200] "GET /wp-login.php HTTP/1.1" 200 6433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.140.240 - - [14/Jun/2020:14:48:52 +0200] "POST /wp-login.php HTTP/1.1" 200 6684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.140.240 - - [14/Jun/2020:14:48:53 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-14 22:55:32 |
| 142.93.140.242 | attack | $f2bV_matches |
2020-06-13 04:30:44 |
| 142.93.140.242 | attack | Jun 12 08:32:17 web1 sshd[32760]: Invalid user aogola from 142.93.140.242 port 37724 Jun 12 08:32:17 web1 sshd[32760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 Jun 12 08:32:17 web1 sshd[32760]: Invalid user aogola from 142.93.140.242 port 37724 Jun 12 08:32:19 web1 sshd[32760]: Failed password for invalid user aogola from 142.93.140.242 port 37724 ssh2 Jun 12 08:37:35 web1 sshd[1569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 user=root Jun 12 08:37:37 web1 sshd[1569]: Failed password for root from 142.93.140.242 port 51662 ssh2 Jun 12 08:39:32 web1 sshd[2032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 user=root Jun 12 08:39:34 web1 sshd[2032]: Failed password for root from 142.93.140.242 port 59994 ssh2 Jun 12 08:41:29 web1 sshd[2548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t ... |
2020-06-12 07:37:49 |
| 142.93.140.242 | attackbots | May 22 04:46:57 gw1 sshd[10458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 May 22 04:46:59 gw1 sshd[10458]: Failed password for invalid user gtx from 142.93.140.242 port 44392 ssh2 ... |
2020-05-22 08:12:56 |
| 142.93.140.242 | attackspam | May 15 21:33:44 ws22vmsma01 sshd[5973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 May 15 21:33:46 ws22vmsma01 sshd[5973]: Failed password for invalid user test from 142.93.140.242 port 32810 ssh2 ... |
2020-05-16 20:09:41 |
| 142.93.140.242 | attackbotsspam | May 15 08:54:57 ns382633 sshd\[24679\]: Invalid user yarn from 142.93.140.242 port 54916 May 15 08:54:57 ns382633 sshd\[24679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 May 15 08:54:58 ns382633 sshd\[24679\]: Failed password for invalid user yarn from 142.93.140.242 port 54916 ssh2 May 15 08:59:36 ns382633 sshd\[25584\]: Invalid user hang from 142.93.140.242 port 42012 May 15 08:59:36 ns382633 sshd\[25584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 |
2020-05-15 18:39:12 |
| 142.93.140.242 | attack | May 13 08:10:04 OPSO sshd\[9009\]: Invalid user weblogic from 142.93.140.242 port 45790 May 13 08:10:04 OPSO sshd\[9009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 May 13 08:10:06 OPSO sshd\[9009\]: Failed password for invalid user weblogic from 142.93.140.242 port 45790 ssh2 May 13 08:13:37 OPSO sshd\[9825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 user=admin May 13 08:13:38 OPSO sshd\[9825\]: Failed password for admin from 142.93.140.242 port 53730 ssh2 |
2020-05-13 19:03:38 |
| 142.93.140.242 | attack | May 11 09:21:42 onepixel sshd[2975521]: Invalid user student02 from 142.93.140.242 port 33052 May 11 09:21:42 onepixel sshd[2975521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 May 11 09:21:42 onepixel sshd[2975521]: Invalid user student02 from 142.93.140.242 port 33052 May 11 09:21:44 onepixel sshd[2975521]: Failed password for invalid user student02 from 142.93.140.242 port 33052 ssh2 May 11 09:25:21 onepixel sshd[2975940]: Invalid user jeremy from 142.93.140.242 port 41636 |
2020-05-11 19:12:59 |
| 142.93.140.240 | attackbots | Automatic report - XMLRPC Attack |
2020-05-09 05:56:23 |
| 142.93.140.242 | attackbotsspam | May 8 14:12:08 electroncash sshd[33246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 May 8 14:12:08 electroncash sshd[33246]: Invalid user asd from 142.93.140.242 port 54534 May 8 14:12:10 electroncash sshd[33246]: Failed password for invalid user asd from 142.93.140.242 port 54534 ssh2 May 8 14:15:53 electroncash sshd[34290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 user=root May 8 14:15:55 electroncash sshd[34290]: Failed password for root from 142.93.140.242 port 35814 ssh2 ... |
2020-05-08 20:26:23 |
| 142.93.140.240 | attackbots | Attempt to hack Wordpress Login, XMLRPC or other login |
2020-05-04 01:48:07 |
| 142.93.140.242 | attackspam | Apr 29 13:57:10 ns382633 sshd\[19948\]: Invalid user regina from 142.93.140.242 port 37402 Apr 29 13:57:10 ns382633 sshd\[19948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 Apr 29 13:57:12 ns382633 sshd\[19948\]: Failed password for invalid user regina from 142.93.140.242 port 37402 ssh2 Apr 29 14:07:45 ns382633 sshd\[21935\]: Invalid user email from 142.93.140.242 port 54264 Apr 29 14:07:45 ns382633 sshd\[21935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 |
2020-04-29 22:18:07 |
| 142.93.140.242 | attack | no |
2020-04-24 21:51:20 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.93.140.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.93.140.80. IN A
;; AUTHORITY SECTION:
. 461 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:43:20 CST 2022
;; MSG SIZE rcvd: 106
Host 80.140.93.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 80.140.93.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.231.75.83 | attack | Dec 3 23:23:51 tux-35-217 sshd\[25631\]: Invalid user ecuartas from 111.231.75.83 port 34366 Dec 3 23:23:51 tux-35-217 sshd\[25631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 Dec 3 23:23:53 tux-35-217 sshd\[25631\]: Failed password for invalid user ecuartas from 111.231.75.83 port 34366 ssh2 Dec 3 23:31:53 tux-35-217 sshd\[25721\]: Invalid user tiao from 111.231.75.83 port 44718 Dec 3 23:31:53 tux-35-217 sshd\[25721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 ... |
2019-12-04 06:55:40 |
| 139.59.164.196 | attackbots | xmlrpc attack |
2019-12-04 06:48:13 |
| 118.24.56.143 | attackbots | Dec 3 23:16:57 localhost sshd[39677]: Failed password for invalid user server from 118.24.56.143 port 60782 ssh2 Dec 3 23:24:44 localhost sshd[39942]: Failed password for invalid user wen from 118.24.56.143 port 48730 ssh2 Dec 3 23:32:00 localhost sshd[40299]: Failed password for invalid user ts3 from 118.24.56.143 port 58296 ssh2 |
2019-12-04 06:48:40 |
| 112.85.42.176 | attackspambots | SSH-bruteforce attempts |
2019-12-04 06:34:29 |
| 49.235.88.96 | attack | Brute force attempt |
2019-12-04 06:32:28 |
| 200.89.178.66 | attackbots | Dec 4 00:37:55 microserver sshd[16237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.178.66 user=root Dec 4 00:37:57 microserver sshd[16237]: Failed password for root from 200.89.178.66 port 33768 ssh2 Dec 4 00:45:11 microserver sshd[17446]: Invalid user ksidc from 200.89.178.66 port 47650 Dec 4 00:45:11 microserver sshd[17446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.178.66 Dec 4 00:45:13 microserver sshd[17446]: Failed password for invalid user ksidc from 200.89.178.66 port 47650 ssh2 Dec 4 00:59:07 microserver sshd[19377]: Invalid user kay from 200.89.178.66 port 41320 Dec 4 00:59:07 microserver sshd[19377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.178.66 Dec 4 00:59:09 microserver sshd[19377]: Failed password for invalid user kay from 200.89.178.66 port 41320 ssh2 Dec 4 01:06:17 microserver sshd[20684]: Invalid user lisa from 200.89.178.66 |
2019-12-04 06:39:06 |
| 144.217.214.100 | attackspam | Dec 4 01:33:03 server sshd\[32605\]: Invalid user admin from 144.217.214.100 Dec 4 01:33:03 server sshd\[32605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net Dec 4 01:33:04 server sshd\[32605\]: Failed password for invalid user admin from 144.217.214.100 port 45846 ssh2 Dec 4 01:39:24 server sshd\[1851\]: Invalid user cerini from 144.217.214.100 Dec 4 01:39:24 server sshd\[1851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net ... |
2019-12-04 06:51:10 |
| 106.75.168.107 | attack | Dec 3 23:32:09 herz-der-gamer sshd[3133]: Invalid user aragorn from 106.75.168.107 port 33814 Dec 3 23:32:09 herz-der-gamer sshd[3133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.168.107 Dec 3 23:32:09 herz-der-gamer sshd[3133]: Invalid user aragorn from 106.75.168.107 port 33814 Dec 3 23:32:10 herz-der-gamer sshd[3133]: Failed password for invalid user aragorn from 106.75.168.107 port 33814 ssh2 ... |
2019-12-04 06:39:47 |
| 218.92.0.180 | attackspambots | Dec 3 23:45:14 mail sshd[17315]: Failed password for root from 218.92.0.180 port 1842 ssh2 Dec 3 23:45:17 mail sshd[17315]: Failed password for root from 218.92.0.180 port 1842 ssh2 Dec 3 23:45:21 mail sshd[17315]: Failed password for root from 218.92.0.180 port 1842 ssh2 Dec 3 23:45:25 mail sshd[17315]: Failed password for root from 218.92.0.180 port 1842 ssh2 |
2019-12-04 06:52:09 |
| 117.62.62.245 | attack | SASL broute force |
2019-12-04 06:59:56 |
| 61.95.233.61 | attackbotsspam | Dec 3 17:25:19 linuxvps sshd\[63786\]: Invalid user odroid from 61.95.233.61 Dec 3 17:25:19 linuxvps sshd\[63786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61 Dec 3 17:25:21 linuxvps sshd\[63786\]: Failed password for invalid user odroid from 61.95.233.61 port 34290 ssh2 Dec 3 17:32:02 linuxvps sshd\[2637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61 user=root Dec 3 17:32:03 linuxvps sshd\[2637\]: Failed password for root from 61.95.233.61 port 45650 ssh2 |
2019-12-04 06:45:20 |
| 114.98.225.210 | attackspambots | Dec 3 23:36:14 v22018086721571380 sshd[9452]: Failed password for invalid user mysql from 114.98.225.210 port 37762 ssh2 Dec 3 23:44:12 v22018086721571380 sshd[10437]: Failed password for invalid user deng from 114.98.225.210 port 46953 ssh2 |
2019-12-04 06:49:57 |
| 168.243.91.19 | attack | Dec 3 23:26:16 ns3042688 sshd\[4897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19 user=root Dec 3 23:26:18 ns3042688 sshd\[4897\]: Failed password for root from 168.243.91.19 port 43039 ssh2 Dec 3 23:32:14 ns3042688 sshd\[6510\]: Invalid user sdtdserver from 168.243.91.19 Dec 3 23:32:14 ns3042688 sshd\[6510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.243.91.19 Dec 3 23:32:15 ns3042688 sshd\[6510\]: Failed password for invalid user sdtdserver from 168.243.91.19 port 48410 ssh2 ... |
2019-12-04 06:33:44 |
| 173.249.7.244 | attackspambots | WordpressAttack |
2019-12-04 06:44:55 |
| 47.188.154.94 | attackbotsspam | Dec 3 07:40:24 server sshd\[2329\]: Failed password for invalid user locher from 47.188.154.94 port 42879 ssh2 Dec 4 01:19:13 server sshd\[28425\]: Invalid user goldwyn from 47.188.154.94 Dec 4 01:19:13 server sshd\[28425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.188.154.94 Dec 4 01:19:15 server sshd\[28425\]: Failed password for invalid user goldwyn from 47.188.154.94 port 47150 ssh2 Dec 4 01:32:09 server sshd\[32444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.188.154.94 user=vcsa ... |
2019-12-04 06:40:07 |